38,769 research outputs found

    Orchestrating Tuple-based Languages

    Get PDF
    The World Wide Web can be thought of as a global computing architecture supporting the deployment of distributed networked applications. Currently, such applications can be programmed by resorting mainly to two distinct paradigms: one devised for orchestrating distributed services, and the other designed for coordinating distributed (possibly mobile) agents. In this paper, the issue of designing a pro- gramming language aiming at reconciling orchestration and coordination is investigated. Taking as starting point the orchestration calculus Orc and the tuple-based coordination language Klaim, a new formalism is introduced combining concepts and primitives of the original calculi. To demonstrate feasibility and effectiveness of the proposed approach, a prototype implementation of the new formalism is described and it is then used to tackle a case study dealing with a simplified but realistic electronic marketplace, where a number of on-line stores allow client applications to access information about their goods and to place orders

    WHO IS THE IDENTIFIABLE VICTIM?--CASTE INTERACTS WITH SYMPATHY IN INDIA

    Get PDF
    Earlier studies have documented an “identifiable victim effect”-- people donate more to help individual people than to groups. Evidence suggests that this is in part due to an emotional reaction to the identified recipients, who generate more sympathy. However, stereotype research has shown that low-ranking groups are often not seen sympathetically; indeed stigmatized groups can be targets of “dehumanized” perception, perceived with disgust. We conducted an internet survey experiment among Indian participants, crossing the identification treatment with the group membership of the recipient. We indicate group membership of identified recipients subtly, with names that connote a social rank. We found an identifiable recipient effect for generically Indian, high caste, and Muslim recipients, but the effect was reversed for low caste recipients. Participants were as willing to donate to statistical low caste recipients as to statistical high caste recipients, but were less willing to donate to identified low caste recipients.However, an identifiable victim effect was seen for all recipient groups among participants open to a love marriage, a coarse indicator of rejecting caste hierarchy in favor of shared humanity. To our knowledge, this is the first study demonstrating that the identifiable victim effect interacts with the identity of the victim.identifiable victim effect; stereotypes; out-groups; caste; Dalit; pro-social behavior; India

    Total Haskell is Reasonable Coq

    Full text link
    We would like to use the Coq proof assistant to mechanically verify properties of Haskell programs. To that end, we present a tool, named hs-to-coq, that translates total Haskell programs into Coq programs via a shallow embedding. We apply our tool in three case studies -- a lawful Monad instance, "Hutton's razor", and an existing data structure library -- and prove their correctness. These examples show that this approach is viable: both that hs-to-coq applies to existing Haskell code, and that the output it produces is amenable to verification.Comment: 13 pages plus references. Published at CPP'18, In Proceedings of 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP'18). ACM, New York, NY, USA, 201

    On Constructing Persistent Identifiers with Persistent Resolution Targets

    Get PDF
    Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintenance-free PIDs using content-centric network technology and overlay networks. For proving the validity of the presented approach, the Handle PID System is used in conjunction with Magnet Link access information encoding, state-of-the-art decentralized data distribution with BitTorrent, and Named Data Networking (NDN) as location-independent data access technology for networks. Contrasting existing approaches, no green-field implementation of PID or major modifications of the Handle System is required to enable location-independent data dissemination with maintenance-free PIDs.Comment: Published IEEE paper of the FedCSIS 2016 (SoFAST-WS'16) conference, 11.-14. September 2016, Gdansk, Poland. Also available online: http://ieeexplore.ieee.org/document/7733372
    • …
    corecore